Support Support Downloads Knowledge Base Case Manager My Juniper Community

Knowledge Base

Search our Knowledge Base sites to find answers to your questions.

Ask All Knowledge Base Sites All Knowledge Base Sites JunosE Defect (KA)Knowledge BaseSecurity AdvisoriesTechnical BulletinsTechnotes Sign in to display secure content and recently viewed articles

18.1R3-S13: Software Release Notification for JUNOS Software Version 18.1R3-S13

0

0

Article ID: TSB18102 TECHNICAL_BULLETINS Last Updated: 07 Jul 2021Version: 1.0
Alert Type:
SRN - Software Release Notification
Product Affected:
ACX, EX, MX, PTX, QFX, NFX, SRX, VRR, vMX, vSRX
Alert Description:
Junos Software Service Release version 18.1R3-S13 is now available for download from the Junos software download site
Download Junos Software Service Release:
  1. Go to Junos Platforms - Download Software page
  2. Input your product in the "Find a Product" search box
  3. From the Type/OS drop-down menu, select Junos SR
  4. From the Version drop-down menu, select your version
  5. Click the Software tab
  6. Select the Install Package as need and follow the prompts
Solution:

Junos Software service Release version 18.1R3-S13 is now available.

18.1R3-S13 - List of Fixed issues
PR Number Synopsis Category: EX4300 PFE
1576022 DHCP packets with source IP as link-local address are dropped in EX4300
Product-Group=junos
On EX4300 Series switches with Multicast Listener Discovery (MLD) snooping enabled, when DHCP packets with source IP as link-local address are sent across EX4300, they will get dropped.
PR Number Synopsis Category: Marvell based EX PFE L3
1557229 Traffic related to IRB interface might be dropped when mac-persistence-timer expires.
Product-Group=junos
On EX3400/EX4400/EX4300MP virtual chassis (VC) platforms, if the IRB interface is configured with members across master and backup VC, the new MAC address of the IRB interface might not be programmed in hardware after mac-persistence-timer expires. This might result in all traffic related to the IRB interface be dropped.
PR Number Synopsis Category: QFX PFE L2
1543169 The dcpfe process might crash when the logical child interface continuously attaches and detaches.
Product-Group=junos
On QFX5K/QFX3600/EX4600 platforms, memory leak might happen when the IFD is continuously attaching and detaching. The dcpfe might crash if the device is running out of memory. Traffic loss might be seen during the dcpfe crash and restart.
1582473 MAC addresses learnt from the MC-LAG client device might keep flapping between the ICL interface and MC-AE interface after one child link in the MC-AE interface is disabled.
Product-Group=junos
On QFX/EX series products using Broadcom chip based PFE (i.e., QFX3500/QFX3600/QFX5100/QFX5110/QFX5120/QFX5200/QFX5210/EX4300/EX4600/EX4650), if Multichassis link aggregation group (MC-LAG) is configured, and the interchassis link (ICL) interface is a physical interface instead of an aggregated Ethernet (AE) interface, after one of the child links in Multichassis Aggregated Ethernet (MC-AE) interface on one of MC-LAG peers is disabled, the MAC addresses learnt from MC-LAG client device might keep flapping between the ICL interface and MC-AE interface. It could cause traffic drop when MAC addresses are learnt on ICL interface. This issue is only exposed in Junos release having the code change in PR 1504586 (which is fixed in Junos: 17.3R3-S9 17.4R3-S3 18.1R3-S11 18.2R3-S6 18.3R3-S3 18.4R2-S6 18.4R3-S6 19.1R3-S2 19.2R3 19.3R3 19.4R3 20.1R2 20.2R2 20.3R1 20.3X75-D10 20.4R1) but not having fix of PR 1582473.
PR Number Synopsis Category: QFX L3 data-plane/forwarding
1573411 The GRE egress traffic might not be forwarded between the different routing-instances.
Product-Group=junos
In the GRE tunnel with the routing-instances scenario, if the next-hop of GRE tunnel destination is learned from the different routing-instance (e.g. the next-hop is learned via leaked route), it might be rejected to be installed into the routing table. Then, the egress GRE traffic will not be forwarded via the egress physical interface, the GRE traffic across the different routing-instances might not be forwarded.
PR Number Synopsis Category: QFX PFE MPLS
1528409 Junos OS: EX4300-MP/EX4600/EX4650/QFX5K Series: Packet Forwarding Engine manager (FXPC) process crashes when deployed in a Virtual Chassis (VC) configuration (CVE-2021-0237)
Product-Group=junos
On Juniper Networks EX4300-MP Series, EX4600 Series, EX4650 Series, QFX5K Series deployed as a Virtual Chassis with a specific Layer 2 circuit configuration, Packet Forwarding Engine manager (FXPC) process may crash and restart upon receipt of specific layer 2 frames. Refer to https://kb.juniper.net/JSA11132 for more information.
PR Number Synopsis Category: Accounting Profile
1509114 The pfed might crash when running 'show pfe fpc x'.
Product-Group=junos
When the pfed is running on a 64 bit machine, it might crash after issuing the command "show pfe fpc x".
PR Number Synopsis Category: JUNOS kernel/ukernel changes for ACX
1509402 On the ACX710 router, the Packet Forwarding Engine might crash and the fpc process might remain down.
Product-Group=junos
On ACX710 platform, after the PTP(Precision Time Protocol) configuration is removed and the router is rebooted, the PFE might crash and the FPC remains down if PTP traffic is still coming into the router. This issue might also happen when SyncE is configured. This causes the router to crash and not come up.
PR Number Synopsis Category: MX Layer 2 Forwarding Module
1462642 On MX Series router, the following logs are seen: L2ALD_MAC_IP_LIMIT_REACHED_IF: Limit on learned MAC+IP bindings reached for .local.1048605; current count is 1024.
Product-Group=junos
MX following logs seen L2ALD_MAC_IP_LIMIT_REACHED_IF: Limit on learned MAC+IP bindings reached for .local.1048605; current count is 1024
PR Number Synopsis Category: Junos Fusion Infrastructure
1454335 The SDPD generates core files at vfpc_all_eports_deletion_complete vfpc_dampen_fpc_timer_expiry.
Product-Group=junos
SDPD core found @ vfpc_all_eports_deletion_complete vfpc_dampen_fpc_timer_expiry on following triggers 1) Delete and add same SD device with some attribute change in single commit 2) Interchange slot id between two SD devices in single commit
PR Number Synopsis Category: Border Gateway Protocol
1446383 The BGP route prefixes are not being advertised to the peer.
Product-Group=junos
In the graceful-restart and delay-route-advertisements are configured scenario, when a BGP router is waiting for the End-Of-Rib message from the upstream BGP peer, the received corresponding set of NLRI (network layer reachability information) might be held in the Rib-Out and not being sent to the downstream BGP peers. This issue will cause the route update failure.
1492743 The BGP route-target family might prevent the route reflector from reflecting Layer 2 VPN and Layer 3 VPN routes.
Product-Group=junos
If the user only sets protocols bgp local-as <> without configuring routing-options autonomous-system <> or having a different autonomous-system number than local-as, the iBGP Route-Reflector (RR) will treat the route-target (RT) routes from iBGP neighbor PEs as an external prefix, and by default, the external peer number is limited to one for a given Route Target, in this case, the Route-Reflector might not reflect L2VPN and L3VPN prefixes to some iBGP clients advertised the same RT prefixes.
PR Number Synopsis Category: MX Platform SW - Power Management
1545838 FPC(s) may not boot-up on MX960/EX9214 in a certain condition
Product-Group=junos
On MX960/EX9214 platforms with high-capacity/normal-capacity power supplies, FPC(s) may fail to come online when the corresponding power is restored afterward but not present during the power-up stage.
PR Number Synopsis Category: MX-ELM l2ng stormcontrol
1552815 The action-shutdown command of storm control does not work for the ARP broadcast packets.
Product-Group=junos
With knob 'action-shutdown' configured in storm control scenario, the interface will not go to shutdown state if ARP storm exceeds the configured limit. The excess packets will be dropped normally.
PR Number Synopsis Category: Layer 3 forwarding, both v4+v6
1477261 Junos OS: ACX5448, ACX710: BFD sessions might flap due to high rate of transit ARP packets (CVE-2021-0216)
Product-Group=junos
A vulnerability in Juniper Networks Junos OS running on the ACX5448 and ACX710 platforms may cause BFD sessions to flap when a high rate of transit ARP packets are received. This, in turn, may impact routing protocols and network stability, leading to a Denial of Service (DoS) condition. Please refer to https://kb.juniper.net/JSA11118 for more information.
PR Number Synopsis Category: EVPN control plane issues
1439537 The rpd process may crash after committing changes in the EVPN environment
Product-Group=junos
On all Junos platforms with EVPN configured, the rpd process may crash after committing any configuration changes if there is an existing MAC entry received from multiple sources and trying to update the latest source. Traffic loss may be observed due to the rpd crash.
PR Number Synopsis Category: EX Chassis Interface Handling
1545514 "jnxDomAlarmSet" and "jnxDomAlarmClear" trap are getting generated at 15 minutes intervals after a link on the transceivers support DOM becomes up or down
Product-Group=junos
A link on the transceivers support DOM (Digital Optical monitoring) becomes up or down, "jnxDomAlarmSet" or "jnxDomAlarmClear" trap will be not generated immediately. It is generated at the interval of 15 minutes. In this example, jnxDomAlarmSet is being generated close to 11 minutes after linkDown event occurs. From messages log>> mib2d[18336]: SNMP_TRAP_LINK_DOWN: ifIndex 610, ifAdminStatus up(1), ifOperStatus down(2), ifName xe-0/2/0 From snmp traceoptions>> notify_jnxdom_alarm: sent jnxDomAlarmSet trap, dom index:610 This fix introduced the new issue on 18.1R3-S12. This caused that "jnxDomAlarmSet" or "jnxDomAlarmClear" trap is generated for a copper port although DOM is not for a copper port. This fix will be removed from 18.1R3-S13.
PR Number Synopsis Category: EX4400 platform
1573889 EX4400: Mgmt LEDs are not working as per expectations
Product-Group=junos
Below is the status of management LED when speed is set to: 1. 10m - Activity LED is not blinking when ping/traffic is runnig (instead it is remaining steady GREEN) 2. 100m - Activity LED is blinking without any ping/traffic.
PR Number Synopsis Category: Express PFE Services including JTI, TOE, HostPath, Jflow
1445585 Receipt of a malformed packet for J-Flow sampling might create a FPC core file.
Product-Group=junos
Receipt of a malformed packet for J-Flow sampling might create a FPC process core.
PR Number Synopsis Category: Optical Transport Interface
1475777 The interface on MIC3-100G-DWDM might go down after performing an interface flap.
Product-Group=junos
On MX with MIC3-100G-DWDM installed, after performing an interface flap, the interface on 100G DWDM MIC might be going down.
PR Number Synopsis Category: jdhcpd daemon
1525052 Memory leak in the jdhcpd process might be seen if access-profile is configured under the dhcp-relay or dhcp-local-server statement.
Product-Group=junos
With access-profile being configured under "forwarding-options dhcp-relay" or "system services dhcp-local-server" stanza, there might be memory leak in jdhcpd when DHCP request is processed. The leaked memory size for each processing will be the number of bytes equal to the length of the access profile.
1564434 Junos OS: Receipt of malformed DHCPv6 packets causes jdhcpd to crash and restart. (CVE-2021-0240)
Product-Group=junos
On Juniper Networks Junos OS platforms configured as DHCPv6 local server or DHCPv6 Relay Agent, the Juniper Networks Dynamic Host Configuration Protocol Daemon (JDHCPD) process might crash if a malformed DHCPv6 packet is received, resulting in a restart of the daemon. The daemon automatically restarts without intervention, but continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. Please refer to https://kb.juniper.net/JSA11168 for more information.
PR Number Synopsis Category: jl2tpd daemon
1537772 Junos OS: MX Series: Executing CLI command repetitively may cause the system to run out of disk space (CVE-2021-0238)
Product-Group=junos
When a MX Series is configured as a Broadband Network Gateway (BNG) based on Layer 2 Tunneling Protocol (L2TP), executing certain CLI command may cause the system to run out of disk space, excessive disk usage may cause other complications. Please refer to https://kb.juniper.net/JSA11133 for more information
PR Number Synopsis Category: Layer 2 Control Module
1561235 The l2cpd process might generate a core file on reboot.
Product-Group=junos
When xSTP is used, the l2cpd core might be seen on reboot. This will be a one-time core and will not impact on functionality.
PR Number Synopsis Category: Label Distribution Protocol
1538124 The rpd process might crash when the LDP route with indirect next hop is deleted on the aggregated Ethernet interface.
Product-Group=junos
If the Label Distribution Protocol (LDP) route with indirect next-hop exists (e.g. LDP egress-policy is used to advertise BGP route into LDP), the rpd might crash when the LDP route is deleted from the AE interface.
PR Number Synopsis Category: Kernel Composite Next Hop (composite / l3vpn) Infrastructure
1548545 The kernel crash with core file might be seen if churn happens for a flood composite next hop.
Product-Group=junos
After continuous churn happens for a flood composite next hop, the kernel crash might be seen.
PR Number Synopsis Category: FreeBSD Kernel Infrastructure
1500902 The redundancy gmac drivers might cause the unexpected behaviors in the EX2300, EX2300-MP, EX3400, ACX710 platforms
Product-Group=junos
If some redundancy gmac drivers are used on the FreeBSD system of the EX2300, EX2300-MP, EX3400, ACX710 platforms, some behaviors might not be consistent between the PHY (physical layer) function and the SerDes (Serializer/Deserializer) function. Then the management connections between the optic interfaces and ASIC/backplane fabric/PICe bus might be unstable, the management traffic (e.g. management interface might be unavailable) might be disrupted.
1525318 Junos OS: telnetd.real Local Privilege Escalation vulnerabilities in SUID binaries (CVE-2021-0223)
Product-Group=junos
A local privilege escalation vulnerability in telnetd.real of Juniper Networks Junos OS may allow a locally authenticated shell user to escalate privileges and execute arbitrary commands as root. Please refer to https://kb.juniper.net/JSA11114 for more information.
1549754 While loading the kernel displays the following error message: GEOM: mmcsd0s.enh: corrupt or invalid GPT detected.
Product-Group=junos
While loading the kernel, user sees the message "GEOM: mmcsd0s.enh: corrupt or invalid GPT detected." This message has no impact on functionality.
1563647 Memory corruption of any binary in /usr/bin/ or /usr/sbin/ may be triggered when a recovery snapshot is being copied to the OAM volume
Product-Group=junos
Memory corruption of a binary from /usr/bin/ or /usr/sbin/ directory can occur if such binary is invoked when a recovery snapshot creation is in progress. The exact symptoms will be different depending on the exact binary and JUNOS version - some programs will show an error, and some programs will crash every time it is executed. Such memory corruption will be persistent until the affected Routing Engine is restarted. Please refer to TSB17954 (https://kb.juniper.net/TSB17954) for further details.
PR Number Synopsis Category: TCP/UDP transport layer
1552603 The BGP session replication might fail to start after the session crashes on the backup Routing Engine.
Product-Group=junos
On certain Junos platforms with Dual-REs (platforms capable of installing Junos packages with name format as "junos*install"), BGP replication may fail to start under GRES/NSR setup after a crash on backup Routing Engine. NSR starts un-replicating the socket since backup Routing Engine is no longer present. Massive unreplicated request leads to memory buffer getting full with multiple BGP sessions (e.g., 20 BGP peers). Hence BGP unreplicated request returned with an error. Besides, the kernel is left with stale data. It does not allow the JSR (Juniper Socket Replication, BGP in this case) when backup RE comes up due to the stale data. BGP-NSR (Nonstop Routing) is broke under the conditions. Traffic outage will be observed after performing GRES.
PR Number Synopsis Category: Interface related issues. Port up/down, stats, CMLC , serdes
1527814 Channelizing the 40G port to 10G port might bring down another interface on the QFX10K platforms
Product-Group=junos
On the QFX10K platforms with 30-port line card installed, when channelizing the 40G port to 10G port, it may bring down another interface unexpectedly. This issue will cause traffic loss on the affected interface.
PR Number Synopsis Category: QFX L2 PFE
1535555 The following Packet Forwarding Engine error message is observed in the BRCM-VIRTUAL: brcm_virtual_tunnel_port_create() ,489: Failed NW vxlan port token(45) hw-id(7026) status(Entry not found).
Product-Group=junos
On a QFX5110 or QFX5120, when the Type 5 tunnels are destroyed, sometime we can see error messages "brcm_virtual_tunnel_port_create() ,489:Failed NW vxlan port token(45) hw-id(7026) status(Entry not found)". There is no functionality impact due to this.
1597261 The interface might not be brought up
Product-Group=junos
The interface might not be brought up if Q-in-Q is configured on Broadcom chipset based QFX/EX platforms except EX2300.
PR Number Synopsis Category: QFX L3 data-plane/forwarding
1560161 Few IPv6 ARP ND fails after loading the base configurations.
Product-Group=junos
On QFX5000 switches, when configuring a VLAN ID for a VXLAN, we recommend using a VLAN ID of 3 or higher. If a VLAN ID of 2 is used, replicated broadcast, multicast, and unknown unicast (BUM) packets for these VXLANs might be untagged, which in turn might result in the packets being dropped by a device that receives the packets.
PR Number Synopsis Category: RPD Next-hop issues including indirect, CNH, and MCNH
1458595 The rpd crash might be seen if BGP route is resolved over the same prefix protocol next-hop in inet.3 table that has both RSVP and LDP routes.
Product-Group=junos
In race condition, if a BGP route is resolved over the same prefix protocol next hop in a routing table that has routes of the prefix from different routing protocols, when the routes are flapping (firstly these routes are down and then up), the BGP route will be re-resolved, and then the rpd crash might be seen.
PR Number Synopsis Category: RPD route tables, resolver, routing instances, static routes
1482112 The rpd process might crash when deactivating logical systems.
Product-Group=junos
On all Junos platforms running with logical systems, if the logical systems get deactivated either by manually restarting the rpd process or by the deletion of the logical system configurations, the rpd process might crash in a race condition. It is a timing issue.
PR Number Synopsis Category: show route table commands, tracing, and syslog facilities
1574497 PIM rib-group fails to be added in VRF.
Product-Group=junos
PIM rib-group failure to add in vrf - PIM: ribgroup vrf not usable in this context; all RIBs are not in instance
PR Number Synopsis Category: SNMP Infrastructure (snmpd, mib2d)
1458057 Junos OS: SNMP fails to properly perform authorization checks on incoming received SNMP requests (CVE-2021-0260)
Product-Group=junos
An improper authorization vulnerability in the Simple Network Management Protocol daemon (snmpd) service of Juniper Networks Junos OS leads an unauthenticated attacker being able to perform SNMP read actions, an Exposure of System Data to an Unauthorized Control Sphere, or write actions to OIDs that support write operations, against the device without authentication. Please refer to https://kb.juniper.net/JSA11151 for more information.
PR Number Synopsis Category: Generic platform and infra issues for MS-MIC and MS-MPC(XLP)
1569894 The mspmand process might crash if the packet flow-control issue occurs on MS-MPC/MS-MIC.
Product-Group=junos
In MX platforms with MS-MPC/MS-MIC scenario, the Packet Ordering Engine (POE) recovery operation will control the right packet descriptor of packet flow and detect jbuf (memory) leak. But, if some rare race conditions happen during this time, this kind of flow-control operation might cause the mspmand to crash. Then, MS-MPC/MS-MIC might restart.
PR Number Synopsis Category: Trio pfe multicast software
1548806 The IIF-LIST APP DWORD leak is observed during the period of churn for the NGMVPN-MoFRR routes with sender-based-rpf enabled.
Product-Group=junos
IIF-LIST APP DWORD leak observed during the period of churn for NGMVPN-MoFRR routes with sender-based-rpf enabled. Two modes of NGMVPN namely SPT-ONLY and RPT-SPT are impacted.
PR Number Synopsis Category: DDos Support on MX
1562474 The DHCPv4 request packets might be wrongly dropped when DDoS attack occurs.
Product-Group=junos
On MX platform, T4000 platform and EX9200 platform, end-users or end-hosts might not get an IPv4 address from Dynamic Host Configuration Protocol (DHCP) server when Distributed Denial-of-Service (DDOS) attack is happened on DHCP rebind packets or renew packets. In the end, end-users or end-hosts could not access into network after lease time of the IPv4 address expired.
PR Number Synopsis Category: UI Infrastructure - mgd, DAX API, DDL/ODL
1553577 The request system software validate on host command does not validate the correct configuration file.
Product-Group=junos
When using the "request system software validate on host username ", please use the latest os-package on remote host for it to properly use the configuration file sent from the host whose configuration file is being validated.
PR Number Synopsis Category: We can use this category for Host protocols (LACP, LAG, ARP)
1354452 The mib2d process generates core file in mib2d_write_snmpidx at snmpidx_sync.c on both ADs while bringing up the base traffic profile.
Product-Group=junos
mib2d core in mib2d_write_snmpidx at snmpidx_sync.c on both ADs while bringing
 

18.1R3-S13 - List of Known issues
PR Number Synopsis Category: EX4300 PFE
1595797 The Egress RACL Firewall filter might not get programmed correctly on EX4300 platforms
Product-Group=junos
On EX4300 platforms, the Egress RACL(Routed ACLs) Firewall filter might not get programmed correctly, if there is any modification made in the filter which is already attached to an interface and it is the only filter in the group. The traffic through the interface will be impacted.
PR Number Synopsis Category: JUNOS kernel/ukernel changes for ACX
1483959 On the ACX5048 router, traffic loss is observed during the unified ISSU upgrade.
Product-Group=junos
On ACX5048/ACX5096 platforms, there might be issues with packet processing on the interfaces post ISSU. The upgrade happens without any issue, however, after the upgrade, the ports does not get enabled in PFE (Packet Forwarding Engine) which might result in traffic loss. This issue is seen when an internal register value gets reset to 0 during ISSU.
PR Number Synopsis Category: ACX L2 related features
1565642 MAC aging might not work when there is active traffic destined to the MAC address on ACX platforms
Product-Group=junos
On certain ACX platforms, MAC address entries might not be deleted from the MAC table at the end of 'mac-table-aging-time' timer when there is active traffic destined to that MAC address. When the issue happens, it might reduce the number of new MAC addresses that can be learned. If the ethernet-switching table overflows, no new MAC addresses will be learned, which might cause traffic flooding.
PR Number Synopsis Category: Control Plane and Infrastructure for the Junos Fusion Enterprise
1188254 Junos Fusion Enterprise: LLDP might stop working if manually deactivated and reactivated
Product-Group=junos
On a Junos Fusion Enterprise, LLDP might stop working if it is reenabled after being manually disabled.
PR Number Synopsis Category: Security platform jweb support
1503557 Junos OS: SRX Series: Denial of Service in J-Web upon receipt of a crafted HTTP packet (CVE-2021-0227)
Product-Group=junos
An improper restriction of operations within the bounds of a memory buffer vulnerability in Juniper Networks Junos OS J-Web on SRX Series devices allows an attacker to cause Denial of Service (DoS) by sending certain crafted HTTP packets. Refer to https://kb.juniper.net/JSA11122 for more information.
PR Number Synopsis Category: Multicast for L3VPNs
1591228 The ddos-protection reason "packets failed the multicast RPF check" may be seen in NG-MVPN scenario with GRE transport
Product-Group=junos
In Next Generation Multicast VPN scenario where GRE is used as a transport and router receives high amount of traffic via Inclusive PMSI without active multicast subscribers, the ddos-protection may be violated with "packets failed the multicast RPF check" reason.
PR Number Synopsis Category: Chassis mgmt for all QFX systems - chassis MIB, alarms, CLI
1572304 QFX10002-60C Configuration being wiped out after upgrading from 18.1 to 18.2+, personality changes
Product-Group=junos
Upgrading from 18.1 to 18.2+, the configuration will be lost due to a "personality change" between those versions, if there is any personality change on the box the configuration should be wiped out.
PR Number Synopsis Category: QFX EVPN / VxLAN
1561588 Dcpfe process might crash on after committing EVPN-VXLAN profile configuration and ARP resolution may fail causing traffic issues.
Product-Group=junos
Dcpfe process might crash on after committing EVPN-VXLAN profile configuration and ARP resolution may fail causing traffic issues.
PR Number Synopsis Category: RPD Interfaces related issues
1406357 The rpd might crash due to a race condition with the combination of community actions done at both a BGP import policy and a forwarding-table policy
Product-Group=junos
When Border Gateway Protocol (BGP) is enabled, if BGP import policy is configured with community actions and the forwarding-table is also applied with a policy with community actions, the rpd process might crash due to this issue. It's a corner case that happens in a race condition.
PR Number Synopsis Category: RPD policy options
1538172 When upgrading Junos OS to a specific version, the configuration validation might fail and the rpd process might crash.
Product-Group=junos
On all Junos OS platforms with "set policy-options rtf-prefix-list" configured, if upgrade to a specific version, the device might fail to validate its configuration which eventually causing rpd to crash unexpectedly due to a software fault.
 
Modification History:
First publication 2021-07-07
Comment on this article > Affected Products Browse the Knowledge Base for more articles related to these product categories. Select a category to begin.

Getting Up and Running with Junos

Getting Up and Running with Junos Security Alerts and Vulnerabilities Product Alerts and Software Release Notices Problem Report (PR) Search Tool EOL Notices and Bulletins JTAC User Guide Customer Care User Guide Pathfinder SRX High Availability Configurator SRX VPN Configurator Training Courses and Videos End User Licence Agreement Global Search